Home Apple Falls Victim To Same Hackers That Attacked Facebook

Apple Falls Victim To Same Hackers That Attacked Facebook

On the heels of Facebook’s announcement Friday that its machines were infected by a sophisticated malware attack, Reuters is reporting that the same hackers have also attacked Apple computers. No data was compromised, according to the company.

While it was to be expected that more companies might be targeted by the malware, since Facebook announced that it was not alone in this attack, it is surprising that Apple, a company with very little history of cybersecurity breaches, has been hit.

The announcement of the breach follows a report Tuesday morning from The New York Times revealing that a large number of Chinese cyberattacks on the U.S. can be traced back to a single building operated by the military in Shanghai. This is leading some to believe that World War III is already on our doorstep, being fought through cyberwarfare on the U.S.’s most influential, powerful and profitable institutions.

(See also Is There Nothing We Can Do To Stop Chinese Hackers?)

Reuters also mentioned the President’s State of the Union address last week, in which Obama issued an executive order to better prepare the nation’s infrastructure for events like this. A follow-up report from Reuters says, “The Obama administration has repeatedly taken up its concerns about Chinese cyber-theft at the highest levels of the Chinese government.”

Apple says to expect a software tool later today to protect against the malicious software being used in the attack.

While all this talk of large-scale security breaches and WWIII cyberwarfare has many people feeling a little unsafe online, not all cybersecurity issues have such serious consequences. On Monday, a lighthearted hack of Burger King’s Twitter account revealed that the company had been sold to McDonald’s.

UPDATE: The New York Times has reported the source of the malware – the mobile developer site iPhoneDevSDK. This should go without saying, but do not visit this site unless you want to open up your computer to an onslaught of malicious malware. 

Image courtesy of pio3 / Shutterstock.

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the tech industry for major developments, new product launches, AI breakthroughs, video game releases and other newsworthy events. Editors assign relevant stories to staff writers or freelance contributors with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Get the biggest tech headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Tech News

    Explore the latest in tech with our Tech News. We cut through the noise for concise, relevant updates, keeping you informed about the rapidly evolving tech landscape with curated content that separates signal from noise.

    In-Depth Tech Stories

    Explore tech impact in In-Depth Stories. Narrative data journalism offers comprehensive analyses, revealing stories behind data. Understand industry trends for a deeper perspective on tech's intricate relationships with society.

    Expert Reviews

    Empower decisions with Expert Reviews, merging industry expertise and insightful analysis. Delve into tech intricacies, get the best deals, and stay ahead with our trustworthy guide to navigating the ever-changing tech market.